The popular hacker Samy Kamkar has presented a new gadget that could be exploited to hacks GM Cars. The tool allows to locate, Unlock, and Start Them. Do you have a General Motors car? Do you have $100 to spare? Do you want to hack your car? If the reply to my questions is yes, […]
Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask the activities of their data-stealer malware. The hackers belonging to the APT 29 […]
A couple of married researchers demonstrated hot to disable high-tech sniper rifles and change their targets with unpredictable consequences. Hacking, hacking, always hacking … this time we will discuss remote hacking of High-tech Sniper Rifles. Hackers can compromise High-tech Sniper Rifles and causing problems pointing to the target. Hackers can gain access to the $13,000 […]
Researchers from Trend Micro discovered a new critical vulnerability in the Android mobile OS that can be exploited to crash mobile devices. Experts from Trend Micro discovered a new vulnerability, an integer overflow bug in the Android mediaserverĀ service, that affects versions of Android starting with 4.3 Jelly Bean and up to 5.1.1 Lollipop. The flaw […]
Accuvant researchers will be releasing an open source piece of hardware dubbed BLEkey that can be used to circumvent these RFID card readers. Do you require to pass a card into a device to enter in your company’s office?Ā Most probably you are using a card based on Radio-Frequency Identification (RFID) technology to grant the […]
United Airlines reportedly hacked by same APT that breached OPM, Anthem. Let’s try to understand why and which are the risks for the US citizens. A ChineseĀ APT group Ā believed to be responsible for a series of high-profile data breaches that affected theĀ U.S. Office of Personnel Management, theĀ Anthem, and more recently theĀ United Airlines. According the media […]
Part of a Pentagon email network taken down over suspicious activity, the US authorities are investigating on the alleged intrusion. New problems for the White House emerges from the cyberspace, a portion of the Department of DefenceāsĀ email network has been taken down over suspicious activity. According to Pentagon spokeswoman, the unclassified email network used by […]
Let’s explain what makes the new Bitphone VoIP service, a perfect tool to perform some social engineering calls. Bitphone is a new VoIP service, a perfect tool to perform some social engineering calls, but why? Bitphone is like a Payphone, the only difference is that in this case you need to pay it with bitcoins […]
PHP File Manager was affected by several critical vulnerabilities for nearly 5 years, according to the security consultant Sijmen Ruwhof. In July 2010 Ruwhof was looking for a web base file manager that he could use in his own web server when he came across with PHP file Manager. At the time, he found out […]
Experts discovered a new Google Drive phishing campaign in which the threat actors deployed phishing web pages on Google Drive. Once again phishers exploited Google’s reputation running a phishing campaign aimed to steal user Google credentials and access to the multitude services offered by the company. The new phishing campaign was discovered by the security […]